A. host security
B. perimeter security
C. security monitoring
D. policy management
您可能感興趣的試卷
你可能感興趣的試題
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
A.3
B.6
C.7
D.8
A. Router mode
B. One-arm mode
C. Three-arm mode
D. Bridge mode inline
A. no congestion avoidance
B. not for bandwidth intensive applications
C. no guaranteed delivery mechanism
D. source sends multiple data streams out each interface
A.4
B.6
C.-67
D.10
最新試題
How many channels are defined in the IEEE 802.11b DSSS channel set?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which of the following is the primary consideration to scale VPNs?()
What is the recommended practice when considering VPN termination and firewall placement?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
Which of these is true of a Layer 3 out-of-band NAS deployment?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()